The concept of oblivious transfer (O.T.) that was i n d u c e d by Halpern and Rabin m] turned out to be a very useful tool in designing cryptographic protocols. The related notion of "one-out-of-two oblivious transfer " was proposed by Even, Goldreich and Lempel in [EGL] together with some applications. Some more applications of this protocol can be found in recent papers [BCR], [GMWj
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Oblivious transfer is one of the most basic and important building blocks in cryptography. As such, ...
Abstract. Protocols for Generalized Oblivious Transfer(GOT) were in-troduced by Ishai and Kushilevit...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 ...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Abstract. We show that oblivious transfer of bits from A to B can be obtained from a single instance...
1 Introduction Oblivious transfer (OT) [21, 8, 27] is a cryptographic primitive of central importanc...
Oblivious transfer is one of the most important cryptographic primitive. An un- fair weak version of...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Oblivious transfer is one of the most basic and important building blocks in cryptography. As such, ...
Abstract. Protocols for Generalized Oblivious Transfer(GOT) were in-troduced by Ishai and Kushilevit...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 ...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Abstract. We show that oblivious transfer of bits from A to B can be obtained from a single instance...
1 Introduction Oblivious transfer (OT) [21, 8, 27] is a cryptographic primitive of central importanc...
Oblivious transfer is one of the most important cryptographic primitive. An un- fair weak version of...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...